CVE-2025-6044: Files or Directories Accessible to External Parties in Google ChromeOS
An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on Lenovo devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature.
AI Analysis
Technical Summary
CVE-2025-6044 is an Improper Access Control vulnerability identified in the Stylus Tools component of Google ChromeOS version 16238.64.0, specifically affecting Lenovo devices. The vulnerability allows a physical attacker to bypass the lock screen and gain unauthorized access to user files. The attack vector involves removing the stylus from the device while it is closed and then exploiting the screen capture feature to access files or directories that should be protected by the lock screen. This indicates a flaw in how the Stylus Tools component manages access permissions and session states when the device transitions from a locked to an unlocked state triggered by stylus removal. Since the exploit requires physical access and interaction with the device, it targets scenarios where an attacker can briefly handle the device without the user’s knowledge. The lack of a CVSS score suggests this vulnerability is newly disclosed and not yet fully assessed. The vulnerability is specific to ChromeOS on Lenovo hardware running the affected version, highlighting a hardware-software interaction issue. No known exploits are reported in the wild, but the potential for sensitive data exposure through bypassing lock screen protections is significant.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments where ChromeOS devices, particularly Lenovo models, are used and where physical security controls may be insufficient. The ability to bypass the lock screen and access user files can lead to unauthorized disclosure of sensitive corporate data, intellectual property, or personal information. This could undermine confidentiality and potentially integrity if attackers modify files. The attack requires physical access, so the threat is higher in shared or public spaces, or in scenarios where devices are left unattended. For sectors such as government, finance, healthcare, and critical infrastructure in Europe, where data protection regulations like GDPR impose strict requirements, such unauthorized access could result in compliance violations and reputational damage. Additionally, the vulnerability could be exploited in targeted espionage or insider threat scenarios. The absence of known exploits reduces immediate risk but does not eliminate the potential impact if weaponized.
Mitigation Recommendations
Organizations should prioritize updating ChromeOS devices to versions beyond 16238.64.0 once patches become available from Google. Until a patch is released, physical security measures must be enhanced to prevent unauthorized access to devices, including strict policies on device handling and storage. Disabling or restricting the use of the stylus and related Stylus Tools features on vulnerable devices can reduce attack surface. Administrators should audit device configurations to ensure screen capture features are disabled or limited when the device is locked. User training to avoid leaving devices unattended and to report lost or stolen devices promptly is critical. Implementing endpoint encryption and multi-factor authentication can provide additional layers of protection, although this vulnerability bypasses lock screen controls, so encryption of sensitive files is essential. Monitoring for unusual device activity and access attempts can help detect exploitation attempts. Finally, organizations should maintain an inventory of affected devices and plan for rapid remediation once official patches are released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-6044: Files or Directories Accessible to External Parties in Google ChromeOS
Description
An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on Lenovo devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature.
AI-Powered Analysis
Technical Analysis
CVE-2025-6044 is an Improper Access Control vulnerability identified in the Stylus Tools component of Google ChromeOS version 16238.64.0, specifically affecting Lenovo devices. The vulnerability allows a physical attacker to bypass the lock screen and gain unauthorized access to user files. The attack vector involves removing the stylus from the device while it is closed and then exploiting the screen capture feature to access files or directories that should be protected by the lock screen. This indicates a flaw in how the Stylus Tools component manages access permissions and session states when the device transitions from a locked to an unlocked state triggered by stylus removal. Since the exploit requires physical access and interaction with the device, it targets scenarios where an attacker can briefly handle the device without the user’s knowledge. The lack of a CVSS score suggests this vulnerability is newly disclosed and not yet fully assessed. The vulnerability is specific to ChromeOS on Lenovo hardware running the affected version, highlighting a hardware-software interaction issue. No known exploits are reported in the wild, but the potential for sensitive data exposure through bypassing lock screen protections is significant.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments where ChromeOS devices, particularly Lenovo models, are used and where physical security controls may be insufficient. The ability to bypass the lock screen and access user files can lead to unauthorized disclosure of sensitive corporate data, intellectual property, or personal information. This could undermine confidentiality and potentially integrity if attackers modify files. The attack requires physical access, so the threat is higher in shared or public spaces, or in scenarios where devices are left unattended. For sectors such as government, finance, healthcare, and critical infrastructure in Europe, where data protection regulations like GDPR impose strict requirements, such unauthorized access could result in compliance violations and reputational damage. Additionally, the vulnerability could be exploited in targeted espionage or insider threat scenarios. The absence of known exploits reduces immediate risk but does not eliminate the potential impact if weaponized.
Mitigation Recommendations
Organizations should prioritize updating ChromeOS devices to versions beyond 16238.64.0 once patches become available from Google. Until a patch is released, physical security measures must be enhanced to prevent unauthorized access to devices, including strict policies on device handling and storage. Disabling or restricting the use of the stylus and related Stylus Tools features on vulnerable devices can reduce attack surface. Administrators should audit device configurations to ensure screen capture features are disabled or limited when the device is locked. User training to avoid leaving devices unattended and to report lost or stolen devices promptly is critical. Implementing endpoint encryption and multi-factor authentication can provide additional layers of protection, although this vulnerability bypasses lock screen controls, so encryption of sensitive files is essential. Monitoring for unusual device activity and access attempts can help detect exploitation attempts. Finally, organizations should maintain an inventory of affected devices and plan for rapid remediation once official patches are released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ChromeOS
- Date Reserved
- 2025-06-12T21:41:59.445Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 686c1b656f40f0eb72ec2c9b
Added to database: 7/7/2025, 7:09:25 PM
Last enriched: 7/7/2025, 7:24:28 PM
Last updated: 7/7/2025, 8:20:52 PM
Views: 4
Related Threats
CVE-2025-7148: Cross Site Scripting in CodeAstro Simple Hospital Management System
MediumCVE-2025-7147: SQL Injection in CodeAstro Patient Record Management System
MediumCVE-2025-1865: CWE-284 in Elaborate Bytes AG Virtual CloneDrive
HighCVE-2025-7144: Cross Site Scripting in SourceCodester Best Salon Management System
MediumCVE-2025-7143: Cross Site Scripting in SourceCodester Best Salon Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.